CVE-2025-66588

9.8 CRITICAL

📋 TL;DR

An uninitialized pointer vulnerability in AzeoTech DAQFactory allows attackers to execute arbitrary code on affected systems. This affects DAQFactory 20.7 Build 2555 installations, potentially compromising industrial control systems and data acquisition environments.

💻 Affected Systems

Products:
  • AzeoTech DAQFactory
Versions: 20.7 Build 2555
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: DAQFactory is commonly used in industrial control systems (ICS) and SCADA environments for data acquisition and control applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the DAQFactory application and underlying system, enabling data manipulation, system disruption, or lateral movement within industrial networks.

🟠

Likely Case

Remote code execution leading to data theft, system manipulation, or disruption of industrial processes controlled by DAQFactory.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

CISA advisory indicates this vulnerability could be exploited remotely without authentication, though specific exploit details are not publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with vendor for updated release

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-345-03

Restart Required: Yes

Instructions:

1. Contact AzeoTech support for patch availability
2. Download and install the updated version
3. Restart DAQFactory services
4. Verify the installation completed successfully

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DAQFactory systems from untrusted networks and internet access

Access Control Restrictions

all

Implement strict firewall rules to limit access to DAQFactory ports

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems from production networks
  • Deploy intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check DAQFactory version in Help > About menu - if version is 20.7 Build 2555, system is vulnerable

Check Version:

Check Help > About in DAQFactory application

Verify Fix Applied:

Verify installed version is newer than 20.7 Build 2555 and check with vendor for specific patched version

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from DAQFactory
  • Memory access violations in application logs
  • Unusual network connections from DAQFactory process

Network Indicators:

  • Suspicious traffic to DAQFactory default ports
  • Unexpected outbound connections from DAQFactory systems

SIEM Query:

Process creation where parent process contains 'daqfactory' AND (command line contains unusual parameters OR destination IP is external)

🔗 References

📤 Share & Export